References
- Agarwal, B. and Mittal, N. (2012), Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques. Procedia Technology, 6, 996-1003. https://doi.org/10.1016/j.protcy.2012.10.121
- Aggarwal, C. C. (2013), Outlier analysis : Springer Science and Business Media.
- Agrawal, R. and Srikant, R. (1995), Mining sequential patterns, Paper presented at the Data Engineering, Proceedings of the Eleventh International Conference on.
- Bae, J., Liu, L., Caverlee, J., and Rouse, W. B. (2006), Process Mining, Discovery, and Integration using Distance Measures, Paper presented at the Web Services, ICWS 2006. International Conference on.
- Bezerra, F. and Wainer, J. (2013), Algorithms for anomaly detection of traces in logs of process aware information systems. Information Systems, 38(1), 33-44. https://doi.org/10.1016/j.is.2012.04.004
- Ciflikli, C. and Kahya-Ozyirmidokuz, E. (2010), Implementing a data mining solution for enhancing carpet manufacturing productivity. Knowledge-Based Systems, 23(8), 783-788. https://doi.org/10.1016/j.knosys.2010.05.001
- Du, W., Fang, L. and Peng, N. (2006), LAD : Localization anomaly detection for wireless sensor networks. Journal of Parallel and Distributed Computing, 66(7), 874-886. https://doi.org/10.1016/j.jpdc.2005.12.011
- Han, J., Kamber, M., and Pei, J. (2012), Data mining : concepts and techniques : Morgan Kaufmann.
- Hawkins, D. M. (1980), Identification of outliers : Springer, 11.
- Laxhammar, R. (2014), Anomaly Detection, Conformal Prediction for Reliable Machine Learning : Theory, Adaptations, and Applications, Elsevier Insight Series, Morgan-Kaufmann Publishers.
- Lin, S. and Brown, D. E. (2006), An outlier-based data association method for linking criminal incidents. Decision Support Systems, 41(3), 604-615. https://doi.org/10.1016/j.dss.2004.06.005
- Ngai, E. W. T. et al. (2011), The application of data mining techniques in financial fraud detection : A classification framework and an academic review of literature. Decision Support Systems, 50(3), 559-569. https://doi.org/10.1016/j.dss.2010.08.006
- Pei, J. et al. (2001), Prefixspan : Mining sequential patterns efficiently by prefix-projected pattern growth, Paper presented at the International Conference on Knowledge Discovery in Databases and Data Mining.
- Potter, C. et al. (2003), Major disturbance events in terrestrial ecosystems detected using global satellite data sets. Global Change Biology, 9(7), 1005-1021. https://doi.org/10.1046/j.1365-2486.2003.00648.x
- Purarjomandlangrudi, A., Ghapanchi, A. H., and Esmalifalak, M. (2014), A data mining approach for fault diagnosis : An application of anomaly detection algorithm. Measurement, 55, 343-352. https://doi.org/10.1016/j.measurement.2014.05.029
- Rebuge, A. and Ferreira, D. R. (2012), Business process analysis in healthcare environments : A methodology based on process mining. Information Systems, 37(2), 99-116. https://doi.org/10.1016/j.is.2011.01.003
- Shyur, H.-J., Jou, C., and Chang, K. (2013), A data mining approach to discovering reliable sequential patterns. Journal of Systems and Software, 86(8), 2196-2203. https://doi.org/10.1016/j.jss.2013.03.105
- Sim, S. et al. (2012), Healthcare process pattern analysis with triage in the emergency department. Journal of the Korean Operations Research and Management Science Society, 37(4), 111-124. https://doi.org/10.7737/JKORMS.2012.37.4.111
- van der Aalst, W. M. P. (2011), Discovery, Conformance and Enhancement of Business Processes : Springer.
- van der Aalst, W. M. P. et al. (2012), Process mining manifesto, Paper presented at the Business Process Management Workshops.
- van der Aalst, W. M. P. et al. (2007). Business process mining : An industrial application. Information Systems, 32(5), 713-732. https://doi.org/10.1016/j.is.2006.05.003
- Witten, I. H., Frank, E., and Hall, M. A. (2011), Data Mining : Practical machine learning tools and techniques (3rd ed.) : Morgan Kaufmann.
- Yang, H. and Song, M. (2015), Analyzing Repair Processes Using Process Mining : A Case Study. Journal of the Korean Institute of Industrial Engineers, 41(1), 86-96. https://doi.org/10.7232/JKIIE.2015.41.1.086